To print the text from this module, select "Print" from the "File" menu.
When you're finished, select "Close" from the "File" menu to return to the course.
Cybercrime covers a broad spectrum of criminal activity involving computers. At one end of the spectrum is the "ping." A ping is an Internet Control Message Protocol, or ICMP, echo command. It is a protocol for determining the availability of a particular port or more generally a computer by sending a short message and waiting for an acknowledgment. A ping has been likened to a knock at one’s door. Generally it is not illegal. But if one knocked so incessantly as to cause a nuisance, it could be a crime. Likewise, pinging so as to slow or deny service would be a crime.
At the other end of the continuum, Infowar is generally state-sponsored, but need not be. Intelligence Preparation of the Battlefield, or IPB, and cyberespionage is also generally state-sponsored, but again, need not be. Terrorism generally threatens death or physical violence for political reasons. Some are arguing that cyberterrorism should not be limited to death or physical violence but should also include destruction or disruption of services. In either event, historically, cyberterrorism has been motivated by a political goal. It is important to note that defense of DoD networks is not dependent upon a finding that the attack is state sponsored. These are not discrete categories. What may constitute acts of information warfare, IPB, cyberterrorism and cyberespionage may also all be cybercrimes.
Just as there are different ways to characterize cyber incidents, so too the law recognizes different "lanes" for reacting to such incidents. Continue to the next topic to find out more about these lanes.